FireWallGuardActions Enumeration
Enumerable that contains FireWall Guard Module names.
Namespace:
Walter.Web.FireWall.FiltersAssembly: Walter.Web.FireWall (in Walter.Web.FireWall.dll)
Members
Member name | Description | |
---|---|---|
None | Indicates none set to be ignored or tested depending on the context | |
RejectKnownBadBoys | The reject known bad boys rule | |
RejectDDOS | The reject distributed denial of service request rule | |
IsBlocked | The manual is blocked rule, can be set by any user code by calling the Block() method from the IFirewall instance | |
RejectNonAspNet | The request is a non ASP net request rule | |
RejectPenetrationAttempts | Reject penetration attempts rule | |
RejectRepeatViolations | The reject known bad boys that are causing repeat violations | |
RejectWrongUserType | The reject requests from wrong user category like IsHuman or distinction like IsMalliciouse types rule | |
RejectWrongProtocol | The reject wrong protocol requests rule | |
RejectAddHockRequests | The reject add hock requests rule | |
EmbeddedResources | Embedded resources rule | |
RejectHitRatioViolations | The reject hit ratio violations | |
RejectRefreshViolations | The reject refresh violations rule | |
RejectScrubbing | The reject scrubbing rule | |
RejectInvalidUserSalt | User presented the wrong cipher salt to the response or request | |
RejectInvalidUserSessionId | Reject those that have the wrong firewall session id | |
RejectInvalidUserPageGroupHeader | reject those that have an invalid PageGroup identifier. | |
RejectCrossSiteRequests | Reject access to a resource if not from internal domain or from a domain that is white-listed (protects HttpPost requests) | |
RejectInvalidUserSessionHeaderId | Invalid session header in request | |
RejectWrongGeography | User access from the wrong geographic region | |
EarlyUserDiscovery | early user discovery modules | |
RejectPhsishing | early user discovery modules | |
RejectSemanticUrlAttack | Reject semantic url attacks | |
RejectAgentsConsideredMalicious | Reject requests from browsers and bots that are considered to be Malicious | |
RejectPoisonedCookies | Reject requests where the firewall detects poisoned cookies | |
RejectIntentions | reject a request based on browser intentions | |
RejectNavigation | reject or allow a request based on links rendered to the user | |
RejectSiteMapViolations | Reject access to endpoints that have not been rendered to a previous request | |
RejectHoneyPotTrap | reject users making use of a ^known honey-pot trap | |
RejectAPIPenetrationAttempts | A penetration attempt made against the firewall management API | |
RejectRejectWhoisProvider | Reject requests if the Internet service provider is having the wrong reputation for a user target user group | |
TCPResetAttack | A attempt is make to take the website off-line by flooding the site with connections that will be processed by the server but are never processed by the initiator | |
RejectCommonVulnerabilitiesExposuresExploits | the attack is a common vulnerabilities and exposure | |
RejectTor | The Attacker is using Tor this access is reject | |
CSPReport | The CSP report | |
ALL | Combination of almost all modules that can be disabled | |
API_ENDPOINT | shorthand for the modules that are typically skipped for API endpoints | |
API_ENDPOINT_LAX | shorthand for the modules that are typically skipped for API endpoints where you allow even those that are blocked to access the endpoint | |
AJAX_ENDPOINT | shorthand for the modules that are typically skipped for AJAX script endpoints |